Descriptive Alt Text

This Week in Cybersecurity: Looking Back at Week 9

February 28, 2025 Reading Time: 4 minutes

This Weeks Headlines


Southern Water Reports £4.5 Million Loss from Black Basta Ransomware Attack

In February 2024, Southern Water, a major UK water supplier, experienced a cyberattack attributed to the Black Basta ransomware group. The company has now disclosed that the incident resulted in expenses totaling €5.44 million (£4.5 million).

Despite the breach, which compromised data from a limited part of their server estate, Southern Water maintained that its operational, financial, and customer-facing systems remained unaffected.

The financial impact was detailed in the company’s recent report, highlighting the significant costs associated with cybersecurity incidents.

View Source

Bybit Suffers $1.5 Billion Cryptocurrency Theft in Largest Exchange Hack to Date

On February 21, 2025, Dubai-based cryptocurrency exchange Bybit experienced a sophisticated cyberattack resulting in the theft of approximately €1.43 billion ($1.5 billion) in digital assets, primarily Ethereum. This incident marks the largest cryptocurrency exchange hack recorded to date.

The attackers exploited vulnerabilities during a routine transfer between digital wallets, redirecting the funds to unidentified addresses.

Bybit has assured its users that remaining assets are secure and has secured emergency funding to replenish its reserves. Blockchain analysis companies have linked the attack to North Korea’s Lazarus Group, a state-sponsored hacking collective known for targeting cryptocurrency platforms to fund governmental activities.

Bybit is actively collaborating with blockchain analytics experts to trace and recover the stolen assets.

View Source

DDoS Attacks Surge by 550% in 2024

In 2024, Distributed Denial-of-Service (DDoS) attacks experienced a dramatic 550% increase compared to the previous year, as reported by Radware’s 2025 Global Threat Analysis Report. This surge is primarily attributed to geopolitical conflicts and the proliferation of AI technologies, which have lowered the barrier to entry for cybercriminals.

The Europe, Middle East, and Africa (EMEA) region was notably impacted, accounting for 78% of global incidents. Industries such as telecommunications and finance faced significant challenges, with the latter witnessing a 393% year-over-year escalation in network-layer DDoS attacks.

The report emphasises the necessity for dynamic defense strategies to combat the evolving cyber threat landscape.

View Source

Malicious ‘PirateFi’ Game Infects Steam Users with Vidar Stealer Malware

A recently released game on Steam, titled ‘PirateFi,’ has been found distributing the Vidar Stealer malware, compromising users’ sensitive information.

The game, described as a survival adventure set on the open sea, garnered positive reviews before its malicious nature was discovered. After approximately a week online, Steam removed ‘PirateFi’ from its platform and notified affected users via email.

The SECUINFRA Falcon Team analysed the malware and confirmed it as a variant of the Vidar Stealer, capable of extracting credentials, session cookies, and other sensitive data from browsers, email clients, and cryptocurrency wallets.

Users who installed ‘PirateFi’ are advised to manually delete the game files from their systems, particularly from the Steam Library and %Temp% folders, and perform a thorough antivirus scan to remove any remaining malicious components.

View Source

Critical Remote Code Execution Vulnerability Discovered in MITRE Caldera Framework

A critical remote code execution (RCE) vulnerability, identified as CVE-2025-27364, has been discovered in all versions of MITRE Caldera prior to commit 35bc06e.

This flaw stems from improper input sanitisation in the dynamic agent compilation functionality of Caldera’s Manx and Sandcat agents. Exploiting this vulnerability allows unauthenticated attackers to execute arbitrary code on the server hosting Caldera, potentially leading to full system compromise.

Users are strongly advised to update to version 5.1.0 or later to mitigate this risk.

View Source

DISA Global Solutions Data Breach Exposes Personal Information of 3.3 Million Individuals

DISA Global Solutions, employee screening and compliance services provider, has disclosed a data breach affecting over 3.3 million individuals.

The breach occurred between February 9 and April 22, 2024, during which unauthorised parties accessed sensitive personal information, including names, Social Security numbers, driver’s license details, and financial account information. Upon discovering the intrusion on April 22, 2024, DISA initiated an internal investigation with third-party cybersecurity experts, secured its network, and implemented additional security measures.

The company has begun notifying affected individuals and is offering 12 months of complimentary credit monitoring and identity restoration services through Experian. Despite the significant delay in public disclosure, DISA asserts there is no evidence of misuse of the compromised data.

View Source

If you’re ready to learn how we can help protect your business from cyber threats, contact us using the form below 👇.

Let's Talk About Your Project

Leave us your details and one of our team will reach out to explore how we can assist with your cybersecurity requirements.

Postal address

The BASE Enterprise Centre

Railway Road

Stranorlar

Co. Donegal

Ireland

F93 VAK6

Phone number
IE: +353 74 970 7876 | UK: +44 20 4538 2818

To learn more about your data and privacy rights, visit our Privacy Statement.